Patents Examined by Carl Colin
-
Patent number: 8549634Abstract: A method and apparatus for detecting a rogue access point in a communication network is described herein. The method includes a probing unit sending a pre-detection message to an associated access point in the communication network. The pre-detection message indicates a start of rogue access point detection mode and informs the associated access point not to respond to probe requests following the pre-detection message. The method further includes the probing unit broadcasting probe requests in the communication network. The probing unit detect that one or more of the plurality of access points is the rogue access point based on receiving a probe response in reply to the broadcasted probe request from the rogue access point. A method for detecting a rogue access point includes broadcasting a probe request with a proprietary information bit and detecting the rogue access point based on receiving a probe response for the broadcasted probe request.Type: GrantFiled: November 10, 2011Date of Patent: October 1, 2013Assignee: Symbol Technologies, Inc.Inventors: Pradip K. Dubey, Jitesh Narayan Verma
-
Patent number: 8544089Abstract: The auditing of a device that includes a physical memory is disclosed. One or more hardware parameters that correspond to a hardware configuration is received. Initialization information is also received. The physical memory is selectively read and at least one result is determined. The result is provided to a verifier.Type: GrantFiled: March 1, 2010Date of Patent: September 24, 2013Assignee: Fatskunk, Inc.Inventors: Bjorn Markus Jakobsson, Karl-Anders R. Johansson
-
Patent number: 8539254Abstract: In one embodiment of the invention, a method is provided for protecting against attacks on security of a programmable integrated circuit (IC). At least a portion of an encrypted bitstream input to the programmable IC is decrypted with a cryptographic key stored in the programmable IC. A number of failures to decrypt the encrypted bitstream is tracked. The tracked number is stored in a memory of the programmable IC that retains the number across on-off power cycles of the programmable IC. In response to the number of failures exceeding a threshold, data that prevents the decryption key from being used for a subsequent decryption of a bitstream is stored in the programmable IC.Type: GrantFiled: June 1, 2010Date of Patent: September 17, 2013Assignee: Xilinx, Inc.Inventors: Brendan K. Bridgford, Jason J. Moore, Stephen M. Trimberger, Eric E. Edwards
-
Patent number: 8539031Abstract: Technologies are described herein for displaying a list of people associated with a message item along with images and other personal context information in a PIM application. The people associated with the message item are identified and a list is generated containing a name, an image, and other personal context information for each. The list of people associated with the message item is displayed in a window of the PIM along with the information regarding the message item.Type: GrantFiled: June 27, 2008Date of Patent: September 17, 2013Assignee: Microsoft CorporationInventors: Can Mehmet Comertoglu, Andrew T. Dean, Autumn Lee Stroupe, Owen Braun, Adriana Cristina Popp
-
Patent number: 8533308Abstract: A traffic management device or other intermediate network device is configured to enable the device to support connection splitting and/or connection aggregation or to otherwise process network transactions for an arbitrary transaction-oriented protocol. The configuration may be accomplished by providing one or more traffic management rules defined by way of a scripting language and provided to an interpreter. The traffic management rule may follow a basic approach common to many protocols and is adapted to the particular protocol being supported. The rule may configure the network device to inspect incoming data, extract length and record type specifiers, buffer an appropriate amount of data to determine transactions or transaction boundaries, and perform other operations.Type: GrantFiled: October 5, 2005Date of Patent: September 10, 2013Assignee: F5 Networks, Inc.Inventor: Jesse Abraham Rothstein
-
Patent number: 8526617Abstract: A method of handling security configuration for a mobile device using a mapped security context in a wireless communication system includes utilizing the mapped security context to derive ciphering and integrity keys when security configuration, indicating a key update based on a cached security context, is received.Type: GrantFiled: September 14, 2009Date of Patent: September 3, 2013Assignee: HTC CorporationInventor: Chih-Hsiang Wu
-
Patent number: 8528080Abstract: Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server.Type: GrantFiled: September 15, 2009Date of Patent: September 3, 2013Assignee: Reefedge Networks, LLCInventors: Bruce McCorkendale, John P. Kelly, Brian Hernacki
-
Patent number: 8522347Abstract: A global response network collects, analyzes, and distributes “cross-vector” threat-related information between security systems to allow for an intelligent, collaborative, and comprehensive real-time response.Type: GrantFiled: March 16, 2010Date of Patent: August 27, 2013Assignee: SonicWALL, Inc.Inventors: Boris Yanovsky, Scott D. Eikenberry, Bhuvan Racham, Nick Bilogorskiy, Gayatri Bhimaraju
-
Patent number: 8522047Abstract: A computer-implemented method of generating tamper-protected computer program code. The method comprises obtaining a representation of the computer program code, the computer program being adapted to cause a data processing system to perform a plurality of computational tasks in a first order of execution, each computational task being represented in the representation of the computer program code by at least one program statement; obtaining a plurality of alternative orders of execution of the computational tasks; generating an executable representation of the program code adapted to cause a data processing system to select a randomized order of execution from the plurality of alternative orders of execution and to execute the computational tasks in the selected randomized order of execution.Type: GrantFiled: June 25, 2008Date of Patent: August 27, 2013Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Johan Eker, Björn Johansson, Carl Von Platen
-
Patent number: 8522345Abstract: There are methods and apparatus, including computer program products, for managing hierarchical reference data. There is a Web page for access by a user, where the Web page includes (i) data representing a hierarchy and (ii) rules defining modifications that are permitted to be made to data. The user is enabled to make a real-time modification to the data based on the rules.Type: GrantFiled: November 1, 2010Date of Patent: August 27, 2013Assignee: FMR LLCInventors: Dinesh Sharma, Mark Goldsmith, Venkat Narsimha Karedla, Brian G. Salloway, Michael Murphy
-
Patent number: 8516552Abstract: A first wireless end-user communication device comprising a user interface and at least one processor configured to: use a forwarding agent on the first wireless end-user communication device to forward traffic between a first wireless access network and one or more other wireless end-user communication devices according to a forwarding policy to implement a forwarding service, the forwarding policy associated with one or more policy settings, the one or more other wireless end-user communication devices communicatively coupled to the first wireless end-user communication device over a wireless local area network or a wireless personal area network; obtain, through the user interface, a modification request to modify an aspect of the forwarding service; modify at least one of the one or more policy settings based at least in part on the modification request; and provide an accounting of a usage associated with the forwarding service.Type: GrantFiled: April 4, 2012Date of Patent: August 20, 2013Assignee: Headwater Partners I LLCInventor: Gregory G. Raleigh
-
Patent number: 8515065Abstract: An input processing circuit decodes a digital video signal selected by an input signal selector. Decryption circuits each decrypt the encryption of a video signal output from the input processing circuit, and generate an authentication key of the encryption. A video signal selector selects and outputs one of the video signals output from the decryption circuits, to a monitor. The decryption circuits each include a pseudo-signal generation circuit which extracts information from the video signal, and based on the extracted information, generates a pseudo-video signal.Type: GrantFiled: February 10, 2012Date of Patent: August 20, 2013Assignee: Panasonic CorporationInventors: Shinya Murakami, Ryogo Yanagisawa, Syuji Kato, Toru Iwata
-
Patent number: 8510835Abstract: A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its algorithms for processing raw data into secured data. The server computer receives and validates the secured data, and attempts to update the communicator if the secured data is invalid. The server computer may deem the client computer as being infected when the update is reinitiated a predetermined number of times. The raw data may be restructured, or encrypted using an encryption scheme where the key used for the encryption is not provided to the receiver of the data. The algorithm for data restructuring and encryption may be included in the update to the communicator. Communication between the client computer and the server computer may be on a dynamically selected channel indicated in a previous communication.Type: GrantFiled: September 18, 2009Date of Patent: August 13, 2013Assignee: Trend Micro IncorporatedInventors: Jayronn Christian Sulit Bucu, Frederic Fritz Anciano Vila, Nicholas Carlo Talens Ramos
-
Patent number: 8510412Abstract: The present invention is a system and method for creating and implementing transactional speech applications (SAs) using Web technologies, without reliance on server-side standard or custom services. A transactional speech application may be any application that requires interpretation of speech in conjunction with a speech recognition (SR) system, such as, for example, consumer survey systems. A speech application in accordance with the present invention is represented within a Web page, as an application script that interprets semantic objects according to a context. Any commonly known scripting language can be used to write the application script, such as JavaScript (or ECMAScript), PerlScript, and VBscript. The present invention is “Web-based” to the extent that it implements Web technologies, but it need not include or access the World Wide Web.Type: GrantFiled: September 6, 2011Date of Patent: August 13, 2013Assignee: Eliza CorporationInventors: John Kroeker, Oleg Boulanov
-
Patent number: 8503855Abstract: An image processing apparatus includes an input unit which receives, from an image capturing apparatus, moving image data in which the shadow of a foreign substance adhered to the surface of an optical member is captured, an obtaining unit which obtains, from the moving image data, foreign substance information including information of the position and size of the foreign substance captured in the moving image data, a playback unit which can play back the moving image data while correcting the shadow of the foreign substance in the moving image data by using the foreign substance information, a display unit which displays an image played back by the playback unit, and a setting unit which sets, in accordance with the playback status of the moving image data, whether to perform processing of correcting the shadow of the foreign substance in each frame of the moving image data.Type: GrantFiled: March 26, 2009Date of Patent: August 6, 2013Assignee: Canon Kabushiki KaishaInventor: Takuya Shintani
-
Patent number: 8505065Abstract: A system is disclosed for creating and implementing an access control policy framework in a weakly coherent distributed collection. A collection manager may sign certificates forming equivalence classes of replicas that share a specific authority. The collection manager and/or certain privileged replicas may issue certificates that delegate authority for control of item policy and replica policy. Further certificates may be signed that create one or more items, set policy for these one or more items, and define a set of operations authorized on the one or more items. The certificates issued according to the present system for creating and implementing a control policy framework cannot be modified or simply overridden. Once a policy certificate is issued, it may only be revoked by the collection manager or by a replica having revocation authority.Type: GrantFiled: June 20, 2007Date of Patent: August 6, 2013Assignee: Microsoft CorporationInventors: Edward P. Wobber, Martin Abadi, Thomas L. Rodeheffer
-
Patent number: 8503854Abstract: In a video playback apparatus that is capable of communicating with a printing device, if an event of which notification is to be given has occurs in the printing device, a situation in which viewing by the user is impeded by the notification and a situation in which unnecessary video is recorded are suppressed. If an error occurs in the printing device, the type of display information prevailing when the error is detected is discriminated (S34). In case of a moving-picture program broadcast, an error message is displayed and the display information starts being stored (S35), thereby making it possible to resume viewing after error recovery. On the hand, in the case of a still picture or other type of display information, an error message is displayed (S310) without storing display information, thereby suppressing unnecessary recording of display information.Type: GrantFiled: October 1, 2007Date of Patent: August 6, 2013Assignee: Canon Kabushiki KaishaInventor: Kazumi Suga
-
Patent number: 8499061Abstract: The invention relates to a method for inserting a new device in a community of devices wherein each device of the community is able to store insertion requests received from at least one new device and to forward these insertion requests to a device chosen by a user of the community for confirming authorization to join the community.Type: GrantFiled: February 16, 2005Date of Patent: July 30, 2013Assignee: Thomson LicensingInventors: Olivier Heen, Nicolas Prigent
-
Patent number: 8495701Abstract: In one embodiment, a computer implemented method for indexing security policies is provided. The computer implemented method determines a policy vocabulary to form a set of policy elements, and creates an index from the set of policy elements. The computer implemented method further receives a request to form requested policy elements, locates requested policy elements in the index to form a set of returned policy elements, and identifies a rule for use with the returned policy elements.Type: GrantFiled: June 5, 2008Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventor: Craig Robert William Forster
-
Patent number: 8489883Abstract: A method, apparatus, and program product are provided for using watermarks to embed security features on avatars in a virtual world. A watermark engine receives security information for an avatar in a virtual world. The watermark engine creates a watermark for the avatar using the security information and associates the watermark with the avatar. The watermark may comprise at least one of: security preferences for the avatar, contact information for an owner of the avatar, and graphical information to cause alteration of the avatar when the avatar is recorded.Type: GrantFiled: September 17, 2009Date of Patent: July 16, 2013Assignee: International Business Machines CorporationInventors: Richard Dean Dettinger, Lydia Mai Do, Frederick Allyn Kulack, Kevin Glynn Paterson